Sciweavers

87 search results - page 3 / 18
» On the Completeness of Attack Mutation Algorithms
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 7 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
13 years 11 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three di...
David Naccache, Michael Tunstall
ICTAI
2008
IEEE
14 years 1 months ago
Attribute Value Taxonomy Generation through Matrix Based Adaptive Genetic Algorithm
We introduce a new adaptive genetic method for AVT generation, MCM-AVT-Learner. The MCM-AVTLearner imports the mutation and crossover matrices which makes effective use of the fi...
Hyunsung Jo, Yong-chan Na, Byonghwa Oh, Jihoon Yan...